BIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre

Size: px
Start display at page:

Download "BIOMETRICS. Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre"

Transcription

1 NEW doctrinal concepts BIOMETRICS by Wing Commander Mark Lunan Royal Air Force Subject Matter Expert and Observer/Trainer Joint Warfare Centre with additional contributions from Lieutenant Colonel Joel Moore, HQ SHAPE Lieutenant Colonel John Moore, JWC Major Wilko ter Horst, HQ SHAPE Oxford English Dictionary Definition Relating to or involving the application of statistical analysis to biological data. Also known as Biometry and Biostatistics in North American English. NATO Definition The automated recognition of individuals based on their behavioral and biological characteristics. Joint Definition The process of recognizing an individual based on measurable anatomical, physiological and behavioral characteristics. The U.S. places biometrics in the category of Identity Intelligence (I2) and is now a discrete category of intelligence products.1 So what for NATO Biometrics is a capability that, together with intelligence, supports the identification of threats to NATO and assists in counter-threat operations conducted by NATO assets. The Three Swords Magazine 33/

2 Documentary sources Allied Intelligence Publication (AIntP) 15 (Countering Threat Anonymity: Biometrics In Support of Operations and Intelligence); NATO Concept for Biometrics in Support of Operations, 21 March 2012; U.S. Army, Joint Publication 2.0, "Joint Intelligence", In 2012, NATO Nations unanimously adopted the Concept of Biometrics in Support of Operations which highlights the broad cooperation required across the full spectrum of military and civilian entities for biometrics to take effect against threat anonymity. The practical use of biometrics in NATO operations first took place in Afghanistan. 2 ABOVE: Flowers posed in the impact of a Kalashnikov bullet in the bar hotel Le Carillon near the Bataclan theater after the terrorist attack in Paris, 13 November Photo by Frederic Legrand, Shutterstock NATO s New Strategic Concept, and the 2014 Wales Summit Declaration identified an increase of that threat posed to the Alliance by individuals and non-state actors, who will act under the protection of anonymity to gain tactical, operational and strategic advantages. Among these increasing threat categories are terrorists 3, traffickers, fo reign fighters, insurgents, hackers and pirates. These actors will seek to remain anonymous and conceal their activities when encountered by NATO forces. The need to identify such actors and mitigate their abi lity to remain anonymous is currently high on NATO s agenda, and to this end biometrics is consi dered one of NATO s top strategic and operational capabilities. The quality of Biometrics Support to Operations is directly proportional to the size of its database used to remove the anony mity. Therefore, NATO Automated Biometrics Identification System (NABIS) was created to provide functionality to store biometrics data and facilitate multimodal biometrics searc hes. NABIS stimulates sharing of biometrics among the [NATO] nations in a controlled environment. It also provides the ability to create a r epository to store biometric data for immediate verification that is available for NATO forces in a Joint Operations Area (JOA). In the context of NATO operations today, when NABIS becomes fully operational, it will give commanders the ability to more quickly and accurately discover, identify, and record the identities of threat actors. It will also enhance Command and Control (C2) by allowing commanders to be automatically informed of who is encountered by whom, where, and at what time. This, in turn, will support actionable i ntelligence at the operational (NATO Response Force (NRF)) and strategic (national agencies) levels. 4 A biometric characteristic is a biological and behavioral signature of a person from which distinguishing, repeatable features can be extracted for the purpose of recognition. Each characteristic has a distinct set of advantages and disadvantages for use in support of military operations. Lessons Learned and Identified by best practices in ISAF by NATO Nations consistently highlighted that collection of certain human characteristics was essential, 5 which are: - Topography: Face, finger and hand. - Structure: Iris, DNA 6 and hand-vein. - Dynamics: Hand-writing, voice and keystroke. - Gait 7 Using biometrics as a means of identifying individuals within the operational environment presents distinct advantages over the traditional methods of using text-based identification processes. These advantages are as follows: - Scientific Accuracy: Includes beyond reasonable doubt. 38 The Three Swords Magazine 33/2018

3 - Real-Time Automation: Enables quicker analytical turnaround time. - Technical Exploitation: Links individuals to items recovered during operations. - Biometrically Enabled Watch Lists: Force multiplier for commanders. 8 Following best practice from Lessons Learned in Afghanistan, biometrics assisted NATO u sing the F4 principles below: - Find: Systematically captured and matched biometric samples from individuals in the battlespace as well as from improvised explosive devices (IEDs), weapons caches, computers, mobile phones, documents and other sources. This in turn identified and linked anonymous persons to networks, places, items, and events. - Fix: Allows NATO to positively identify (PID) the targets of operations more accurately, which increases fidelity in targeting. - Finish: Biometrics allows the use of a Biometrics Enabled Watch List (BEWL), which allows the NATO commanders to provide specific guidance to operational as well as tactical elements on how to address specific individuals encountered during operations. 9 - Force Multiplier: Biometric samples, captured across the comprehensive spectrum can be automatically matched, which empowers C2, force protection, counter-intelligence and targeting efforts. The additional use of BEWLs creates opportunities within operations to find, fix and finish threats. 10 The interdependent purpose of NATO biometrics for capturing and using biometric data in support of NATO operations is the identification of threat actors. This is accomplished by one foundation (Enrolment), and two primary (Identification and Verification) biometric functions. 11 Biometric Enrolment is the act of creating and storing a biometric data record. It can be used to biometrically link an event record to an individual. Biometric Enrolment also takes place when a latent biometric sample is digitized for matching against a biometric database. Latent biometric samples are developed through technical exploitation and subsequent forensic processes, which are used to recover latent fingerprints or DNA ABOVE: "Topography" collection examples. A smartphone scans a person's face for facial recognition (1), fingerprint capture to analyze fingerprint data (2), "Dynamics" collection example of voice sampling (3). from items. 12 Biometric Identification is the process when a biometric sample is compared against all records in a biometric repository or system of repositories to find and return the biometric reference identifier(s) attributable to an individual. It is used to associate that individual with previously collected biographic and situational information. Its primary focus is to identify anonymous threat persons. 13 Biometric records can originate through inter-agency sharing or from military activities. Sharing can originate from historic datasets provided by Allied, host, or Partner Nations. Biometric Enrolment records from a variety of military activities can be simultaneously checked against the database for Biometric Identification, while adding additional enrolment records to the database. 14 Biometric Verification, meanwhile, is a one-to-one process in which an individual s biometric sample is matched against his stored biometric file. It is often used in processes associated with ID cards and is used to control access to bases, areas, facilities, assets, and events. Biometric Verification, supported by biometric Identification, is vital in detecting insider threat and preventing green on blue attacks. 15 A NATO or Partner Nation s use of biometrics may be permitted or constrained by national laws and international agreements to which they are a party. These factors vary from one nation to another and these variances impact on how each nation might participate in NATO biometric activities. As such, the NATO Biometric Framework and Cycle was created to promote an interoperable and collaborative NATO standard. 16 The NATO Biometric Framework and Cycle sets a baseline of technical interoperability standards, concepts for national control 17 and processes for assessing and protecting privacy and data security; all of which underpins planning and evaluation. Here is an explanation of some of the abbreviations: BDR: The Biometric Data Record contains those human characteristics of an individual listed above (Topography, Structure, Dynamics, Gait). 18 BDS: A Biometric Data Subject is an individual person. This can be a volunteer, such as a loca lly employed civilian working inside a NATO deployed base or a threat individual/ person of interest. A factor in determining the capture and use of biometric data is whether its capture is consensual or non-consensual. In certain instances, Biometric Series Rules of Engagement and national caveats may determine whether or not consent is required. 19 BEI: Biometric Enrolled Identification is the intelligence resulting from the capture, processing, analysis, interpretation and dissemination of biometric data, the contextual information associated with that data and other associated information and intelligence. It aims to integrate the information from biometric capture and processing into all-source intelligence analysis. BEWL: Biometric Enabled Watch List is an intelligence product, which assesses and categorizes biometrically identified individuals. The BEWL is key to the dissemination of biometric information throughout NATO commands. 20 The Three Swords Magazine 33/

4 ABOVE: NATO Biometric Framework and Cycle. BTBR: Biometric Technical Business Rules is a set of rules in a system developed to automate the requirements of sharing arrangements. Ping and Ring : A slang term for NATO and national inter-agency coordination, cooperation and biometrics information exchange. 21 This term is also extended to the biometrics user community at the operational and tactical levels within a JOA. A typical Ping and Ring graphic is depicted below, which highlights information sharing between two nations resulting in a Multi-Biometric Match Report (MBMR). MBMRs contain biometric encounters by multiple NATO nations, and as such, each of those nations potentially has valuable information regarding the individual. The nation that last encounters an individual is the necessary customer of information and intelligence regarding that individual. This is known as the Principle of Last Encounter. 22 Legal Concerns: The main legal issues in biometrics involve the sharing of identity intelligence activities, data and techniques between the NATO Nations. Concept Papers and reports of Biometrics Working Groups generally state that biometric information is Personally Identifiable Information (PII) that must be handled in accordance with the applicable national laws of the collecting nation. 23 In the near future, The Three Swords Magazine expects to feature an article explaining the legal aspects of biometrics in detail. So what for NATO Within the context of the NRF operations, here are two examples of Biometrics Support: 1/ Inter-Agency Cooperation: The NRF is supporting a foreign nation s re-building process, which is being undermined by arms smuggling into that state. All biometric operations are conducted using ABIS. 24 A civilian truck driver provides biometric samples to the nations border police, who are supported by the BELOW: Inter-Nation Biometric Coordination and Information Exchange. NRF elements. The biometric samples and contextual information are transmitted to the JOA ABIS, and subsequently compared to the locally stored biometric files. The truck driver s biometric data does not match any file in the JOA ABIS, and a negative response is provided back to the border police. The truck driver is also checked against local and national criminal records. The border police review the match result and clear the truck driver to continue. The biometric file is enrolled and stored in the JOA ABIS, and is then shared with other agencies (where information sharing agreements are already in force). Two weeks later, the host nation s national police, supported by the NRF, conduct a raid on the arms-smuggler s safe house and seize numerous documents and computer hardware. Biometric samples are collected from this evidence, and compared to the JOA ABIS. A match is made between the latent samples collected during the raid and the truck driver s biometric file. An analysis of the data collected from the raid and associated information is completed and the truck driver s non-biometric reference information is updated with these new samples, red-flagged for future matches, placed on the JOA BEWL and shared with all biometric system operators within the country. Several days later, the truck driver attempts to cross into the host nation at a different border checkpoint. He submits his indivi dual identification and a biometric sample for verification. The sample is com- 40 The Three Swords Magazine 33/2018

5 ABOVE: Iris scanning during a biometrics course at the Joint Readiness Training Center. "Biometrics is the science of using physiological features, such as fingerprints or irises, as a method of identification," said the class instructor, adding: "The good thing about using biometrics is that it's real time. That means if you're scanning someone, it will give you an answer within a couple seconds." Photo by Pvt. Luke Rollins, U.S. Army. ( lewis_soldiers_learn_about_biometrics_at_jrtc) pared against the JOA BEWL, which alerts the border police to the red flag stored in the JOA ABIS. The truck driver is detained for questioning and his biometric file is updated with the newly collected biometric sample and contextual data. 2/ Humanitarian Assistance Relief: The NRF is responding as part of an international disaster relief effort. Thousands of injured are being treated and awaiting further treatment as soon as field medical hospitals are assembled and operational. All individuals who receive medical attention within the disaster area are immediately enrolled in a NATO biometric local ABIS that has been established for management of the Internally Displaced Persons (IDPs). All treatment records are linked to their respective biometric files. Many of the injured, after being initially treated, voluntarily relocate within the disaster area. However, this movement is making it difficult for medical personnel to efficiently provide medical services or track patients for follow-up treatment. The NRF medical personnel are performing triage for IDPs arriving by buses at one of the newly established field hospitals. They collect biometric samples from each IDP for identification purposes as part of the initial medical assessment process. The biometric files are then sent for matching against the local ABIS to assist with the identification of the individual and retrieve any available medical treatment history. An IDP who cannot be matched against the local ABIS is enrolled as a new biometric file. All subsequent medical treatment will later be linked to that file. When an IDP is positively matched against the local ABIS, links to his/her medical history are accessed and any prior treatment records are retrieved. Subsequent treatment is updated in the IDPs medical record so that information can be accessed by others again in the future by using the established net-centric links between the non-biometric repository (medical files) and his/her biometric file. The NRF medical personnel use these medical records to aid in triage. Biometrics is used the world over by everyone, not just NATO, including humanitarian relief organizations or law enforcement agencies. From the moment you apply for a dri ving license or passport perhaps, you are in the system therefore biometrics is nothing new. Within the NATO context, biometrics has proven to be a significant theatre-level force multiplier in supporting a host nation in their fight against organized crime and terro rism and in humanitarian relief. Af- Photo by vlada93, Shutterstock ghanistan was a typical example of how the International Security Assistance Force (ISAF) was able to do this. Future NRF operations are highly likely to use biometrics, dependent upon the mission, legal considerations and, of course, constraints or restraints stipulated by the re levant host nation. END NOTES:! Biometrics is real time 1 U.S. Army, Joint Publication 2.0, "Joint Intelligence" (2013). 2 International Security Assistance Force (ISAF) used biometrics across Afghanistan Some NATO Nations do not regard counter-terrorism as a military function; however, intelligence collected in military operations can be essential to national operations. 4 Allied Intelligence Publication 15, "Countering Threat Anonymity: Biometrics in Support of NATO Operations and Intelligence (NATO Standardization Office 2016) [hereinafter AInt-15]. 5 Id. 6 Deoxyribonucleic Acid. 7 AInt-15, F-5: "a biometric characteristic based on walking pattern". 8 AInt-15 9 AInt Id. 11 Id. 12 Id. 13 Id. 14 Id. 15 Id. 16 Id. 17 NATO can only suggest or recommend to nations on matters of national control. 18 AInt Id. 20 Id. 21 Subject to national caveats and NATO constraints and restraints. 22 AInt NATO & Int'l Military Staff, Concept for Identity Intelligence (I2) (2017). 24 Automated Biometric Identification System. The Three Swords Magazine 33/

DOD Capstone Concept of Operations for Employing Biometrics in Military Operations

DOD Capstone Concept of Operations for Employing Biometrics in Military Operations DOD Capstone Concept of Operations for Employing Biometrics in Military Operations Approved by Deputy Chief of Staff, G-3/5/7, United States Army 10 June 2012 Table of Contents EXECUTIVE SUMMARY... iii

More information

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified? Introduction Who are you?? Biometrics CSE 190-C00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means: Introduction Who are you?? Biometrics CSE 190-B00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Gap Analysis of the Department of Homeland Security s Use of Biometrics Camille J. Acred Southwestern College Professional Studies MSA 570 Homeland

More information

DHS Biometrics Strategic Framework

DHS Biometrics Strategic Framework U.S. Department of Homeland Security DHS Biometrics Strategic Framework 2015 2025 Version 1.0 June 9, 2015 Prepared by the IBSV Biometrics Sub-Team Contents 1 INTRODUCTION... 2 1.1 PURPOSE... 2 1.2 CONTEXT...

More information

DHS Biometric Screening

DHS Biometric Screening DHS Biometric Screening 9/22/2015 National Protection and Programs Directorate (NPPD) Who We Are OBIM is the designated lead provider for biometric identity services for the Department of Homeland Security

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate Open Briefing of the Counter-Terrorism Committee on Denying Save Haven to Those who Finance, Plan, Support, or Commit Terrorist Acts, or Provide Safe Havens, and Preventing Terrorists from Abusing the

More information

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

Biometrics: primed for business use

Biometrics: primed for business use Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be

More information

Achieving Interoperability

Achieving Interoperability Fact Sheet IDENT and IAFIS Interoperability Goal of IDENT and IAFIS Interoperability As a part of the U.S. government s efforts to enhance our nation s security to meet the needs and challenges of the

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

Opinion 3/2012 on developments in biometric technologies

Opinion 3/2012 on developments in biometric technologies ARTICLE 29 DATA PROTECTION WORKING PARTY 00720/12/EN WP193 Opinion 3/2012 on developments in biometric technologies Adopted on 27 th April 2012 This Working Party was set up under Article 29 of Directive

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

Research Article. ISSN (Print)

Research Article. ISSN (Print) Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY Presented By: Cristian Morosan - University of Houston CRISTIAN MOROSAN ASSISTANT PROFESSOR CONRAD N. HILTON COLLEGE UNIVERSITY OF HOUSTON

More information

CASE STUDY 2 Portuguese Immigration & Border Service

CASE STUDY 2 Portuguese Immigration & Border Service CASE STUDY 2 Portuguese Immigration & Border Service Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS... 4 3 CHALLENGE... 4 4 SOLUTION DESCRIPTION...

More information

International Biometrics & Identification Association

International Biometrics & Identification Association International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication

More information

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9

More information

REPORT VOLUME 6 MAY/JUNE 2017

REPORT VOLUME 6 MAY/JUNE 2017 BORDER SECURITY REPORT VOLUME 6 MAY/JUNE 2017 For the world s border protection, management and security industry policy-makers and practitioners COVER STORY Smarter Borders in Spain AGENCY NEWS SHORT

More information

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014

INTERPOL s face programme for a safer world. Mark Branchflower Monday 17th March 2014 INTERPOL s face programme for a safer world Mark Branchflower Monday 17th March 2014 Why Facial Recognition? The International Perspective Proliferation of surveillance cameras The International Perspective

More information

10880/17 GdK/lwp 1 CAB LIMITE EN

10880/17 GdK/lwp 1 CAB LIMITE EN Council of the European Union Brussels, 11 July 2017 (OR. en) 10880/17 LIMITE CT 68 ENFOPOL 342 COTER 59 JAI 654 COSI 163 NOTE From: To: Subject: EU Counter-Terrorism Coordinator Delegations Strengthening

More information

Biometrics & Accessibility

Biometrics & Accessibility Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics

More information

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference John Kendall Director Public Sector and Security Programs, Asia-Pacific 27 May 2015 Key Border Security Challenges

More information

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams

Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams Reg. No 21964 Annex I List of profiles Profiles of border guards and other relevant staff to be made available to the European Border and Coast Guard Teams Frontex - European Border and Coast Guard Agency

More information

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending, DISJOINTED PROGRESS JULY 2016 Bottom Line Up Front Despite significant advances and proliferation of biometric technology in the commercial market, the federal government has yet to take full advantage

More information

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

LEGISLATION. The BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT LEGISLATION The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT" SECTION 1. NEW LAW A new section of law to be codified in the (Appropriate Statutes of State, hereafter Statutes ), unless

More information

CORPORATE HEADQUARTERS

CORPORATE HEADQUARTERS 113 South Columbus Street, Suite 400 Tel: (703) 797-2600 Fax: (703) 706-9549 June 5, 2013 The Honorable Jeff Sessions 326 Russell Senate Office Building Washington, D.C. 20510 The Honorable Dianne Feinstein

More information

Position Paper IDENT Implementation for U.S. VISIT

Position Paper IDENT Implementation for U.S. VISIT Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

INTRODUCTION BACKGROUND. Chapter One

INTRODUCTION BACKGROUND. Chapter One Chapter One INTRODUCTION BACKGROUND The U.S. Army has a growing need to improve access control for its many systems, both in wartime and in peacetime. In wartime, the Army s dependence on information as

More information

International Journal of Research and Review E-ISSN: ; P-ISSN:

International Journal of Research and Review   E-ISSN: ; P-ISSN: International Journal of Research and Review www.gkpublication.in E-ISSN: 2349-9788; P-ISSN: 2454-2237 Original Research Article Biometric Finger Print: Its Authentication and Effectiveness on Health Care

More information

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? ACCENTURE CITIZEN SURVEY ON BORDER MANAGEMENT AND BIOMETRICS 2014 FACILITATING THE DIGITAL TRAVELER EXPLORING BIOMETRIC BARRIERS With

More information

Identity Verification in Passport Issuance

Identity Verification in Passport Issuance Identity Verification in Passport Issuance and dcivil ilregistration i The importance of context and continuity of identity Mr Ross Greenwood Principal Identity Matters Consulting 1 PURPOSE To invite a

More information

Enhancing Identity Verification and Border Processes Legislation Bill (PCO 19557/14.0) Our Ref: ATT395/252

Enhancing Identity Verification and Border Processes Legislation Bill (PCO 19557/14.0) Our Ref: ATT395/252 2 10 June 2016 Attorney-General Enhancing Identity Verification and Border Processes Legislation Bill (PCO 19557/14.0) Our Ref: ATT395/252 1. We have reviewed this Bill for consistency with the New Zealand

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

How biometrics can improve the targeting of social protection. What we do. How we do it.

How biometrics can improve the targeting of social protection. What we do. How we do it. How biometrics can improve the targeting of social protection What we do. How we do it. How biometrics can improve the targeting of social protection What we do. How we do it 3 In developing countries,

More information

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program US-Visit In the wake of the attacks of September 11, 2001, the United States federal

More information

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents EDPS Opinion 7/2018 on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents 10 August 2018 1 Page The European Data Protection Supervisor ( EDPS

More information

Meijers Committee standing committee of experts on international immigration, refugee and criminal law

Meijers Committee standing committee of experts on international immigration, refugee and criminal law CM1802 Comments on the Proposal for a Regulation of the European Parliament and of the Council on establishing a framework for interoperability between EU information systems (police and judicial cooperation,

More information

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012

Bali Process Ad Hoc Group Workshop on Biometrics for Identity Integrity in Immigration India April 2012 BALI PROCESS AD HOC GROUP WORKSHOP ON BIOMETRICS FOR IDENTITY INTEGRITY IN IMMIGRATION NEW DELHI, INDIA, 23-26 APRIL 2012 CO-CHAIRS' STATEMENT 1. The Bali Process on People Smuggling, Trafficking in Persons

More information

Government of Pakistan NADRA Headquarters, Islamabad

Government of Pakistan NADRA Headquarters, Islamabad Abbaba Government of Pakistan NADRA Headquarters, Islamabad 1 Who We Are 2 Social Support Initiatives 3 Future Strategy National Database and Registration Authority Registrar General of Pakistan NADRA

More information

Biometrics Strategy Better public services Maintaining public trust. June 2018

Biometrics Strategy Better public services Maintaining public trust. June 2018 Biometrics Strategy Better public services Maintaining public trust June 2018 Crown copyright 2018 This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 11 November /04 LIMITE VISA 203 COMIX 684 NOTE

COUNCIL OF THE EUROPEAN UNION. Brussels, 11 November /04 LIMITE VISA 203 COMIX 684 NOTE COUNCIL OF THE EUROPEAN UNION Brussels, 11 November 2004 14534/04 LIMITE VISA 203 COMIX 684 NOTE from: to: Subject: The chairman of the Committee created by Article 6 of Regulation 1683/95 laying down

More information

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit. PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD

More information

Compendium of Good Practices in Identity Management

Compendium of Good Practices in Identity Management Compendium of Good Practices in Identity Management Zoran Đoković and Simon Deignan ICAO TRIP: Making Air Travel more Secure and Efficient TOWARD BETTER TRAVELLER IDENTIFICATION MANAGEMENT FOR ENHANCED

More information

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Introduction e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives Following the events of September 11, 2001 many countries accelerated plans for the adoption of a new

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card Abstract Have you ever wondered how Identity Theft, Fraud, and Corruption could be eliminated, while

More information

Biometric-enabled Intelligence in Regional Command East

Biometric-enabled Intelligence in Regional Command East Biometric eye scanner identifies patients arriving at hospital at Bagram Airfield (U.S. Army/Chris Hargreaves) Biometric-enabled Intelligence in Regional Command East By David Pendall and Cal Sieg In Afghanistan,

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver Machine Readable Travel Documents: Biometrics Deployment Barry J. Kefauver Smart Card Alliance March 10, 2004 International Civil Aviation Organization (ICAO) United Nations organization Established in

More information

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How

More information

Finland's response

Finland's response European Commission Directorate-General for Home Affairs Unit 3 - Police cooperation and relations with Europol and CEPOL B - 1049 Brussels Finland's response to European Commission's Public Consultation

More information

Identity and Biometrics Enabled Intelligence (BEI) Sharing for Transnational Threat Actors

Identity and Biometrics Enabled Intelligence (BEI) Sharing for Transnational Threat Actors Identity and Biometrics Enabled Intelligence (BEI) Sharing for Transnational Threat Actors By Victor R. Morris Journal Article Mar 22 2016-2:13am Identity and Biometrics Enabled Intelligence (BEI) Sharing

More information

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: Introduction Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: As a process: 1. A measurable biological (anatomical and physiological) and

More information

EU Information Systems

EU Information Systems Workshop on Migration Management : Sharing Experiences between Europe and Thailand co-organized by the European Union and Royal Thai Government, Ministry of Foreign Affairs EU Information Systems Bangkok,

More information

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY

MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY MEDICAL UNIVERSITY OF SOUTH CAROLINA DEPARTMENT OF PUBLIC SAFETY POLICY AND PROCEDURE # 105 SUBJECT: Identity Theft EFFECTIVE DATE: 16 June 2006 PAGE 1 OF 8 REVIEW DATE: 30 November 2017 APPROVED: CHANGE

More information

Singapore's Automated Clearance using Biometrics

Singapore's Automated Clearance using Biometrics Singapore's Automated Clearance using Biometrics Dr. Yau Wei Yun 1 & Ms. Koh Ting Ting 2 Institute for Infocomm Research, Singapore 1 Ministry of Home Affairs 2 Biometric Passports Meant for better border

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE

COUNCIL OF THE EUROPEAN UNION. Brussels, 29 October /09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE COUNCIL OF THE EUROPEAN UNION Brussels, 29 October 2009 15184/09 JAIEX 79 RELEX 981 ASIM 114 CATS 112 JUSTCIV 224 USA 93 NOTE from : to : Subject : Presidency Delegations EU-US Statement on "Enhancing

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21916 Updated February 7, 2005 CRS Report for Congress Received through the CRS Web Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues Summary Daniel

More information

Biometric Authentication

Biometric Authentication CS 361S Biometric Authentication Vitaly Shmatikov Biometric Authentication Nothing to remember Passive Nothing to type, no devices to carry around Can t share (usually) Can be fairly unique if measurements

More information

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs

GAO. BORDER SECURITY Joint, Coordinated Actions by State and DHS Needed to Guide Biometric Visas and Related Programs GAO United States Government Accountability Office Testimony Before the Committee on Government Reform, House of Representatives For Release on Delivery Expected at 10:00 a.m. EDT Thursday, September 9,

More information

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council The National Crime Prevention and Privacy Compact Council (Compact Council) is

More information

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528

The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC Washington, DC 20528 The Honorable Michael Chertoff Office of the Secretary Department of Homeland Security Attn: NAC1-2-37 Washington, DC 20528 Re: Docket# DHS-2006-0030 Minimum Standards for Driver Licenses and Identification

More information

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER CONTENTS Executive summary 4 Sophisticated security threats stretch national borders 5 Widespread adoption of biometrics

More information

Protection of Freedoms Act 2012

Protection of Freedoms Act 2012 Protection of Freedoms Act 2012 Draft statutory guidance on the making or renewing of national security determinations allowing the retention of biometric data March 2013 Issued Pursuant to Section 22

More information

BIOMETRICS 101. Facial Recognition in Oregon

BIOMETRICS 101. Facial Recognition in Oregon BIOMETRICS 101 Facial Recognition in Oregon SB 640 Approved by the Oregon Legislature in 2005 Codified in Oregon Revised Statutes ORS 807.024 807.026 Purpose - To address the growing problem of identity

More information

Refugee Security Screening

Refugee Security Screening Office of Communications Fact Sheet Dec. 3, 2015 Refugee Security Screening U.S. Citizenship and Immigration Services (USCIS) is deeply committed to safeguarding the American public from threats to public

More information

Recommended Practice 1701 l

Recommended Practice 1701 l Recommended Practice 1701 l Background: The International Traveler Scheme aims to bring registered travelers schemes together under one overall program. The purpose of an International Traveler Scheme

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 7 July 2005 (28.07) (OR. nl) 10900/05 LIMITE CRIMORG 65 ENFOPOL 85 MIGR 30

COUNCIL OF THE EUROPEAN UNION. Brussels, 7 July 2005 (28.07) (OR. nl) 10900/05 LIMITE CRIMORG 65 ENFOPOL 85 MIGR 30 COUNCIL OF THE EUROPEAN UNION Brussels, 7 July 2005 (28.07) (OR. nl) 10900/05 LIMITE CRIMORG 65 FOPOL 85 MIGR 30 NOTE from: to: Subject: Council Secretariat delegations Prüm Convention Delegations will

More information

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD)

TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) International Civil Aviation Organization WORKING PAPER TAG-MRTD/18-WP/8 22/4/08 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG-MRTD) EIGHTEENTH MEETING Montréal, 5 to

More information

The Open Biometrics Initiative and World Card

The Open Biometrics Initiative and World Card The Open Biometrics Initiative and World Card Notes on RealTechSupport for Biometrics Marc Böhlen, MediaRobotics Lab, University at Buffalo Out-collect the data collectors WhatTheHack2005, The Netherlands

More information

Border Management and People Clearance. The Singapore Experience. Interpol - 5 th Special Meeting of the Counter-Terrorism Committee

Border Management and People Clearance. The Singapore Experience. Interpol - 5 th Special Meeting of the Counter-Terrorism Committee Border Management and People Clearance The Singapore Experience Interpol - 5 th Special Meeting of the Counter-Terrorism Committee 29 to 31 October 2007 SCOPE OF PRESENTATION Brief Facts about Singapore

More information

Global Entry Program. Information Guide

Global Entry Program. Information Guide Global Entry Program Information Guide 1 Table of Contents Page Table of Contents.........................................2 Global Entry..............................................3 What are the benefits?....................................3

More information

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009

Ad-Hoc Query on Implementation of Council Regulation 380/2008. Requested by FI EMN NCP on 10 th September 2009 Ad-Hoc Query on Implementation of Council Regulation 380/2008 Requested by FI EMN NCP on 10 th September 2009 Compilation produced on 8 th December 2009 Responses from Austria, Belgium, Denmark, Estonia,

More information

Background and Status of the Tanzania National ID System

Background and Status of the Tanzania National ID System 1 Background and Status of the Tanzania National ID System 2 Coverage INTRODUCTION IMPLEMENTATION STATUS KEY TECHNOLOGIES CHALLENGES WAY FORWARD 3 INTRODUCTION Introduction- Tanzania at Glance. Total Area:

More information

ID4D IDENTIFICATION FOR DEVELOPMENT

ID4D IDENTIFICATION FOR DEVELOPMENT ID4D IDENTIFICATION FOR DEVELOPMENT The World Bank Group s ID4D initiative uses global knowledge and expertise across sectors to help countries realize the transformational potential of digital identification

More information

IOM/ACBC CAPACITY BUILDING INITIATIVES

IOM/ACBC CAPACITY BUILDING INITIATIVES IOM/ACBC CAPACITY BUILDING INITIATIVES Presenter Name Presenter Title Location/date PRESENTATION OUTLINE 1. Introduction: IOM/ICAO MoU a) IOM - Who we are, why and how we engage in this sector; b) IOM/ICAO

More information

Prepared by Space and Naval Warfare Systems Center Atlantic

Prepared by Space and Naval Warfare Systems Center Atlantic System Assessment and Validation for Emergency Responders (SAVER) Biometric Systems Application Note June 2015 Prepared by Space and Naval Warfare Systems Center Atlantic Approved for public release, distribution

More information

Agreement on counter-terrorism measures

Agreement on counter-terrorism measures 10/12/2015 Agreement on counter-terrorism measures We stand united in the fight against terrorism. Accountability and cooperation are required if the population of Sweden are to feel safe and secure. Having

More information

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records

Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records Potentially Ineligible Individuals Have Been Granted U.S. Citizenship Because of Incomplete Fingerprint Records September 8, 2016 OIG-16-130 DHS OIG HIGHLIGHTS Potentially Ineligible Individuals Have Been

More information

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011] [To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the ----------, 2011] Government of India MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department

More information

Biometrics from a legal perspective dr. Ronald Leenes

Biometrics from a legal perspective dr. Ronald Leenes Biometrics from a legal perspective dr. Ronald Leenes TILT - Tilburg Institute for Law, Technology, and Society outline introduction biometrics, use legal aspects privacy/data protection biometrics as

More information

DATA PROTECTION POLICY

DATA PROTECTION POLICY DATA PROTECTION POLICY Page 1 of 14 TABLE OF CONTENTS 1. GENERAL PROVISIONS 2. PRINCIPLES AND CONDITIONS OF PERSONAL DATA PROCESSING 2.1 Principles of Personal Data Processing 2.2 Conditions of Personal

More information

Biometrics Technology for Human Recognition

Biometrics Technology for Human Recognition Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed

GAO HOMELAND SECURITY. Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable Schedule Needed GAO United States Government Accountability Office Report to Congressional Requesters November 2009 HOMELAND SECURITY Key US-VISIT Components at Varying Stages of Completion, but Integrated and Reliable

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information

Preamble. THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE KINGDOM OF SWEDEN (hereinafter referred to as the Parties ):

Preamble. THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE KINGDOM OF SWEDEN (hereinafter referred to as the Parties ): AGREEMENT BETWEEN THE GOVERNMENT OF THE UNITED STATES OF AMERICA AND THE GOVERNMENT OF THE KINGDOM OF SWEDEN ON COOPERATION IN SCIENCE AND TECHNOLOGY FOR HOMELAND SECURITY MATTERS Preamble THE GOVERNMENT

More information

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters

GAO DEPARTMENT OF STATE. Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters March 2009 DEPARTMENT OF STATE Undercover Tests Reveal Significant Vulnerabilities in State s Passport Issuance Process

More information

Cross-Border & Regional Identity Management

Cross-Border & Regional Identity Management Cross-Border & Regional Identity Management Grahame Saunders: Chief Technology Officer: NEC Africa April 2017 Who we are Leading social value innovator Provides telecommunications, IT and Enterprise business

More information

e-borders: Friends of Presidency Group meeting Brussels

e-borders: Friends of Presidency Group meeting Brussels e-borders: Friends of Presidency Group meeting Brussels Tim Rymer Head of Joint Border Operations Centre Border & Immigration Agency 27 March 2008 Friends of Presidency group: PNR History and setting up

More information

ICCWC Indicator Framework for Combating Wildlife and Forest Crime

ICCWC Indicator Framework for Combating Wildlife and Forest Crime International Consortium on Combating Wildlife Crime ICCWC Indicator Framework for Combating Wildlife and Forest Crime A self-assessment framework for national use ASSESSMENT GUIDELINES ASSESSMENT TEMPLATE

More information

Fraud Detection and National Security Data System (FDNS-DS)

Fraud Detection and National Security Data System (FDNS-DS) for the Fraud Detection and National Security Data System (FDNS-DS) DHS/USCIS/PIA-013(a) May 18, 2016 Contact Point Donald K. Hawkins Privacy Officer U.S. Citizenship and Immigration Services 202-272-8000

More information

Exploring Civilian Protection: A Seminar Series

Exploring Civilian Protection: A Seminar Series Exploring Civilian Protection: A Seminar Series (Seminar #1: Understanding Protection: Concepts and Practices) Tuesday, September 14, 2010, 9:00 am 12:00 pm The Brookings Institution, Saul/Zilkha Rooms,

More information